General

  • Target

    631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f

  • Size

    794KB

  • Sample

    230506-15nz2adc2w

  • MD5

    a6e4b2ce9f7cf879d31fe1e2a08e8666

  • SHA1

    e7f96de935562bf32d3524a47144989e02a6b718

  • SHA256

    631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f

  • SHA512

    627114d79ca1c769aa3ea1bb9aeb53a302da351ca09700229660690d4179e5795c815307cb83131da12090c6ef73afdbac94c71bc7aea6c343f1be0fad2d4691

  • SSDEEP

    24576:/yueo+YGvBJzaPTbi3sCQGsg3vebHVwAmcz:Ko+7BJGPTb4Jag3vG15mc

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dork

C2

185.161.248.73:4164

Attributes
  • auth_value

    e81be7d6cfb453cc812e1b4890eeadad

Targets

    • Target

      631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f

    • Size

      794KB

    • MD5

      a6e4b2ce9f7cf879d31fe1e2a08e8666

    • SHA1

      e7f96de935562bf32d3524a47144989e02a6b718

    • SHA256

      631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f

    • SHA512

      627114d79ca1c769aa3ea1bb9aeb53a302da351ca09700229660690d4179e5795c815307cb83131da12090c6ef73afdbac94c71bc7aea6c343f1be0fad2d4691

    • SSDEEP

      24576:/yueo+YGvBJzaPTbi3sCQGsg3vebHVwAmcz:Ko+7BJGPTb4Jag3vG15mc

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks